Commit Graph

111 Commits

Author SHA1 Message Date
gruebel
23978e644f Refactor sqs.send_message_batch 2019-10-26 22:08:45 +02:00
Jack Danger
00045ae480
Merge branch 'master' into add-iam-virtual-mfa-device 2019-10-22 14:54:10 -07:00
Jack Danger
37dd02b2ce
Updating IMPLEMENTATION_COVERAGE.md (#2507)
Includes a fix for the script that generates this file.
2019-10-22 14:51:30 -07:00
gruebel
1d9382b5e5 Add iam.list_virtual_mfa_devices 2019-10-21 21:48:50 +02:00
gruebel
c80135a6db Add iam.delete_virtual_mfa_device 2019-10-20 23:03:20 +02:00
gruebel
9671730f16 Add iam.create_virtual_mfa_device 2019-10-20 22:39:57 +02:00
gruebel
cd8027ce9d Add iam.list_open_id_connect_providers 2019-10-18 21:15:48 +02:00
gruebel
f4af9a1d54 Add iam.delete_open_id_connect_provider 2019-10-18 21:15:48 +02:00
gruebel
c492c5c228 Add iam.get_open_id_connect_provider 2019-10-18 21:15:05 +02:00
gruebel
bd627b65f7 Add iam.create_open_id_connect_provider 2019-10-18 21:15:05 +02:00
Mike Grima
4dd347e1fe
Merge pull request #2487 from bblommers/feature/iam_delete_policy
Feature - [IAM] Delete Policy
2019-10-18 09:53:51 -07:00
gruebel
05dc97b468 Update implementation coverage 2019-10-17 22:41:46 +02:00
Bert Blommers
856a06a778 IAM - Delete Policy implementation 2019-10-17 09:28:19 +01:00
gruebel
26ef792690 Add sns.untag_resource 2019-10-12 21:10:51 +02:00
gruebel
726775678c Add sns.tag_resource 2019-10-12 20:37:59 +02:00
gruebel
8d527743d5 Add sns.list_tags_for_resource 2019-10-11 17:58:48 +02:00
Steve Pulec
59543c404a
Merge pull request #2450 from jimjshields/add-ecs-service-tag-resource
Add support for tagging and untagging ECS services
2019-10-03 16:04:14 -05:00
Jim Shields
ff1e55f74c Update implementation coverage 2019-10-03 15:20:58 -04:00
Mike Grima
567a6da31d
Merge pull request #2439 from Kerl1310/feature/send_templated_email
#2437 Implementing send_templated_email
2019-10-03 11:49:45 -07:00
Kyle Jones
a69e1d7a0f Updated AUTHORS.md and IMPLEMENTATION_COVERAGE.md 2019-10-02 09:57:22 +01:00
Wayne Metcalfe
9c66839f85 feat: implement logs untag_log_group 2019-09-26 20:20:53 +01:00
Wayne Metcalfe
0561a0050f feat: implement logs tag_log_group 2019-09-26 19:57:34 +01:00
Wayne Metcalfe
3cb7c3e568 feat: implement logs list_tags_log_group 2019-09-26 17:04:09 +01:00
Steve Pulec
9cc6a1533f
Merge pull request #2409 from bblommers/feature/stepfunctions
Step Functions - basic method implementation
2019-09-24 18:16:07 -05:00
Steve Pulec
b8a79611d6
Merge pull request #2397 from mattsb42-aws/kms
Making kms:Encrypt/Decrypt/GenerateDataKey more real
2019-09-11 22:13:33 -05:00
Bert Blommers
78254cc4f2 Step Functions - Execution methods 2019-09-04 15:42:42 +01:00
Bert Blommers
af4082f38e Step Functions - State Machines methods 2019-09-02 16:26:40 +01:00
Wessel van der Veen
a4c79c19ab forgot to update implementation coverage. 2019-09-02 12:37:23 +02:00
mattsb42-aws
776a54b89f update KMS implementation coverage 2019-08-27 23:59:46 -07:00
Steve Pulec
e568dadadc Move implementation percentage to separate line. Closes #2368. 2019-08-21 21:19:29 -05:00
Chiharu Terashima
7fa5ce3dc3 implements APIGateway update_api_key 2019-08-03 01:28:47 +09:00
Steve Pulec
5c34c06d07
Merge pull request #2311 from caguado/fix/2310
Implement get_open_id_token
2019-07-20 00:12:18 -04:00
Steve Pulec
6bc07360a1
Merge pull request #2313 from caguado/fix/2312
Implement assume_role_with_web_identity
2019-07-15 23:08:23 -05:00
Carlos Aguado
e54f74776b Implement assume_role_with_web_identity
The AssumeRoleWithWebIdentity is a similar endpoint to STS's AssumeRole
where the authentication element is a JWT id_token from a configured OP.
This commit implements the functionality and relies on the same result
generated for the regular AssumeRole.
2019-07-16 13:27:47 +10:00
Carlos Aguado
7c17fcd21d Implement get_open_id_token
Introduce the CognitoIdentity's GetOpenIDToken endpoint to retrieve a
JWT tuple from Cognito's Identity Pool for a given IdentityId.
2019-07-16 13:20:31 +10:00
Carlos Aguado
81980850d4 Implement update_user_pool_domain
Introduce the CognitoIDP's UpdateUserPoolDomain to update configuration
options of the associated domain to a Cognito IDP (e.g. ACM certificate).
2019-07-16 13:09:13 +10:00
Don Kuntz
17b8ce7df0 Update implementation coverage with current glue coverage 2019-06-11 14:32:55 -05:00
Juan Martinez
664b27d8e7 Implement ECR batch_delete_image (#2225)
This implements the endpoint in spulec #2224
2019-05-30 18:16:19 +01:00
Bendegúz Ács
8f53b16b9a Updates to create_subnet and describe_subnets responses (#2053)
* Removed Tags field from create_subnet response.

* Added DefaultForAz to create_subnet response.

* Added MapPublicIpOnLaunch to create_subnet response.

* Added OwnerId to create_subnet response.

* Added AssignIpv6AddressOnCreation field for create_subnet and describe_subnet and implemented setting it in modify_subnet_attribute.

* Added SubnetArn to create_subnet response.

* Added AvailabilityZoneId to create_subnet and describe_subnet responses, and error for invalid availability zone.

* Added Ipv6CidrBlockAssociationSet to create_subnet response.

* Added missing fields to describe_subnets response.

* Added myself to list of contributors and marked describe_subnet as implemented.

* Fixed linting errors.

* Fixed blank line containing a tab.

* Fixed accidentally deleted ).

* Fixed broken tests.
2019-05-28 16:33:25 +01:00
Bendegúz Ács
6fb85ac430 Updated implementation coverage for cloudformation (#2139)
* Updated implementation coverage for cloudformation

* Updated cloudformation coverage with recently implemented endpoints
2019-05-25 18:34:29 +01:00
Adam Hodges
71f83d7e4f Add support for IoT register_certificate (#1827) 2019-05-25 18:30:23 +01:00
Gregory Bataille
d952410965 1987 support transfer acceleration (#2018)
* chore(): remove executable flag on moto/s3/response.py

* chore(): ignore .eggs temp file

* feat(#1987): get bucket acceleration support

* feat(#1987): put bucket acceleration support

* feat(#1987): suspend undefined bucket is a no-op

* feat(#1987): validate accelerate_configuration status

* feat(#1987): bucket containing dots do not support acceleration

* doc(#1987): update implementation coverage
2019-05-25 11:19:00 +01:00
Mark Challoner
d8ff67197b Add resource-groups. (#1953) 2019-05-25 11:10:34 +01:00
Ashley Gould
a3f6d2c110 [Resolves #2196] - endpoints for querying organizations SC policies (#2197)
adding support for organizations service control policies

* [Resolves #2196] - endpoints for querying organizations SC policies

I have added the following mock endpoints to the Organizations service:

- create_policy
- list_policies
- describe_policy
- attach_policy
- list_policies_for_target
- list_targets_for_policy
2019-05-25 10:20:19 +01:00
Justin Kieber-King
bbd7fefb37 Feature: Secrets Manager put_secret_value and list_secret_version_ids (#2116)
* initial work

- adding put_secret_value and list_secret_versions

* Added support for versions in all functions except rotate_secret

* more work

- refactor rotate_secret method
  - now, adds a new version of the secret and points default version id to it
- updated implementation coverage readme
- element in list check to fix unit test
- fixed linting errors
- added tests, fixed exception, failing tests still
- secrets_manager/test_server fails when running whole suite,
  but not when running that individual test file

* fixed failing test_get_secret_value

* Removed test.py. Fixed condition statement.

* fixed default stages + adding AWSPREVIOUS

* remove old AWSPREVIOUS stages
2019-05-22 10:45:22 +01:00
Alexey Firsov
f13e4e41cd add implemented kinesis method describe_stream_summary (#2023) 2019-05-21 00:02:36 +01:00
Jordan
1de9acb7ad Add cognito-idp admin_update_user_attributes #2184 (#2185) 2019-05-20 23:58:10 +01:00
Mike Grima
603f7c58a2
Merge pull request #2166 from chriskilding/feature/secretsmanager-restoresecret
Feature: Secrets Manager restore-secret
2019-04-26 09:50:02 -07:00
Christopher Kilding
55fe629112 Feature: Secrets Manager restore-secret 2019-04-24 10:03:04 +01:00
Steve Pulec
88e1f0fa23
Merge pull request #2015 from corrjo/master
#1514 Stackset Support
2019-04-22 19:04:47 -05:00